On Fri, October 28, 2016 9:43 am, Johnny Hughes wrote: > On 10/22/2016 07:49 PM, Valeri Galtsev wrote: >> Dear All, >> >> I guess, we all have to urgently apply workaround, following, say, this: >> >> https://gryzli.info/2016/10/21/protect-cve-2016-5195-dirtycow-centos-7rhel7cpanelcloudlinux/ >> >> At least those of us who still have important multi user machines >> running >> Linux. (Yes, me too, I do have a couple, thank goodness, the rest are >> already not ;-) >> >> Have a productive weekend, everybody. >> >> Valeri >> > > And to close the book on this CVE, I just pushed the CentOS-5.11 kernel > to fix this issue as well: > > kernel-2.6.18-416.el5 Johnny, thanks a lot!! (even though on my most ancient venerable couple of boxes still running CentOS 5 users can not execute anything of their own, so the boxes are immune to hack from inside, is still gives one great feeling to have kernel patched). Thanks again for the great job you, guys are doing! Valeri > > So, the only thing we still have to release is a fixed kernel for the > aarch64 AltArch SIG. And we are building a test kernel for that right > now. > > ppc64le, ppc64, i686, arm32 for CentOS-7 .. and all released arches for > CentOS-5 and CentOS-6 ... now all have updates released. > > Thanks, > Johnny Hughes > > > _______________________________________________ > CentOS mailing list > CentOS@xxxxxxxxxx > https://lists.centos.org/mailman/listinfo/centos > ++++++++++++++++++++++++++++++++++++++++ Valeri Galtsev Sr System Administrator Department of Astronomy and Astrophysics Kavli Institute for Cosmological Physics University of Chicago Phone: 773-702-4247 ++++++++++++++++++++++++++++++++++++++++ _______________________________________________ CentOS mailing list CentOS@xxxxxxxxxx https://lists.centos.org/mailman/listinfo/centos